CVE-2017-10916
Published: 05 July 2017
The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.6.5-0ubuntu1.2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [code not present])
|
|
Binaries built from this source package are in Universe and so are supported by the community. |